CN109600254A - The generation method and related system of full link log - Google Patents

The generation method and related system of full link log Download PDF

Info

Publication number
CN109600254A
CN109600254A CN201811442226.1A CN201811442226A CN109600254A CN 109600254 A CN109600254 A CN 109600254A CN 201811442226 A CN201811442226 A CN 201811442226A CN 109600254 A CN109600254 A CN 109600254A
Authority
CN
China
Prior art keywords
service
list
call request
call
blacklist
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811442226.1A
Other languages
Chinese (zh)
Other versions
CN109600254B (en
Inventor
陈哲
林金曙
金基东
卢长松
陈华华
蒋志伟
张奇明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hundsun Technologies Inc
Original Assignee
Hundsun Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hundsun Technologies Inc filed Critical Hundsun Technologies Inc
Priority to CN201811442226.1A priority Critical patent/CN109600254B/en
Publication of CN109600254A publication Critical patent/CN109600254A/en
Application granted granted Critical
Publication of CN109600254B publication Critical patent/CN109600254B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/069Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications

Abstract

This application provides the generation methods and related system of a kind of full link log, wherein in the generation method of full link log, after receiving call request, first judges whether the corresponding service of the call request belongs to monitored service;Judging that the corresponding service of the call request belongs to the monitored service, just after the corresponding service of the call request is called, generate link log, it solves for the problem that any one request and when calling service, generation link log causes to increase unnecessary link log.

Description

The generation method and related system of full link log
Technical field
This application involves technical field of data processing more particularly to a kind of generation methods and phase relation of full link log System.
Background technique
For the request that requesting party sends, the calling that multiple services are executed by multiple nodes is generally required.By requesting party Start until the calling link constituted between multiple nodes can then be referred to as full link.Full link log is then used to record each It is a to service the state called by node.
Currently, realizing the generating process of full link log, the program of service is called generally by modification, allows service in quilt It is generated after calling and transmits corresponding link log.However, the program of service is called in modification, it is meant that for any one request And when calling the service, it is required to generate link log, this will increase many unnecessary link logs.
Summary of the invention
Based on above-mentioned the deficiencies in the prior art, the application proposes the generation method and related system of a kind of full link log, When calling service to solve to request for any one, generation link log causes to increase unnecessary link log Problem.
To solve the above problems, the scheme now proposed is as follows:
A kind of generation method of full link log, comprising:
Receive call request, wherein the call request is for calling service;
Judge whether the corresponding service of the call request belongs to monitored service;
If judging, the corresponding service of the call request belongs to the monitored service, in the call request pair After the service answered is called, link log is generated.
Optionally, in the above-mentioned methods, the corresponding service of the judgement call request, if belong to monitored clothes Business, comprising:
Obtain the list of default building, wherein the list includes at least one of blacklist and white list;Wherein, institute It states blacklist and is used to store the information on services for needing to monitor for storing the information on services for being not necessarily to monitoring, the white list;
The corresponding service of the call request is matched with the information on services in the list;
If the information on services in the corresponding service of call request and the blacklist mismatches, and/or, the calling It requests corresponding service to match with the information on services in the white list, then judges that the corresponding service of the call request belongs to In the monitored service.
Optionally, in the above-mentioned methods, the list includes blacklist, and the blacklist includes container levels list and journey Sequence grade list;Wherein, the container levels list includes a variety of service type informations, and described program grade list includes the calling of service Method;
It is described to match the corresponding service of the call request with the information on services in the list, comprising:
Determine the type information of the corresponding service of the call request and the method name of calling;
The type information of the service determined is matched with the container levels list in the blacklist, and by institute The method name for stating the service call determined is matched with program level list in the blacklist;
If the type information of the service determined is not belonging to the container levels list in the blacklist, and the determination Type information out is not belonging to program level list in the blacklist, then judges that the corresponding service of the call request belongs to institute State monitored service.
Optionally, in the above-mentioned methods, the list includes white list, and the white list includes container levels list and journey Sequence grade list;Wherein, the container levels list includes a variety of service type informations, and described program grade list includes the calling of service Method;
It is described to match the corresponding service of the call request with the information on services in the list, comprising:
Determine the type information of the corresponding service of the call request and the method name of calling;
The type information of the service determined is matched with the container levels list in the white list, and by institute The method name for stating the service call determined is matched with program level list in the white list;
Wherein, if the type information of the service determined belongs to the container levels list in the white list, and it is described The type information determined belongs to program level list in the white list, then judges that the corresponding service of the call request belongs to The monitored service.
Optionally, in the above-mentioned methods, the list includes blacklist and white list, and the white list includes container levels List and program level list, the blacklist include container levels list and program level list;Wherein, the container levels list includes A variety of service type informations, described program grade list include the call method of service;
It is described to match the corresponding service of the call request with the information on services in the list, comprising:
Determine the type information of the corresponding service of the call request and the method name of calling;
By the type information of the service determined, respectively with the container levels list of the white list and the blacklist Container levels list matched, and by the method name of the service call determined, respectively with the program of the white list The program level list of grade list and the blacklist is matched;
Wherein, if the type information of the service determined belongs to the container levels list of the white list and is not belonging to The method name of the container levels list of the blacklist, the service call determined belongs to the program level name of the white list It is single, and be not belonging to the container levels list of the blacklist, then judge that the corresponding service of the call request belongs to described supervised The service of control.
Optionally, in the above-mentioned methods, after generating link log, further includes:
Obtain the affairs ID and service call chain serial number in the call request;
Update the service call chain serial number;
It is passed according to the affairs ID and the updated service call chain serial number gencration call request, and to next service It is defeated.
Optionally, in the above-mentioned methods, further includes:
Judge the affairs ID obtained less than in the call request and service call chain serial number, then creates unique thing Simultaneously service call chain serial number initial value is arranged in business ID.
A kind of generating means of full link log, comprising:
Receiving unit, for receiving call request, wherein the call request is for calling service;
Judging unit, for judging whether the corresponding service of the call request belongs to monitored service;
Generation unit, if it is described monitored to judge that the corresponding service of the call request belongs to for the judging unit Service generate link log then after the corresponding service of the call request is called.
Optionally, in above-mentioned apparatus, the judging unit, comprising:
First acquisition unit, for obtaining the list of default building, wherein the list includes blacklist and white list At least one;Wherein, the blacklist is used to store the information on services without monitoring, and the white list needs to monitor for storing Information on services;
Matching unit, for matching the corresponding service of the call request with the information on services in the list;
If the information on services in the corresponding service of call request and the blacklist mismatches, and/or, the calling It requests corresponding service to match with the information on services in the white list, then judges that the corresponding service of the call request belongs to In the monitored service.
Optionally, in above-mentioned apparatus, the list includes blacklist and white list, and the white list includes container levels List and program level list, the blacklist include container levels list and program level list;Wherein, the container levels list includes A variety of service type informations, described program grade list include the call method of service;The matching unit, comprising:
Determination unit, for determining the type information of the corresponding service of the call request and the method name of calling;
Coupling subelement, for by the type information of the service determined, respectively with the container levels of the white list The container levels list of list and the blacklist is matched, and by the method name of the service call determined, respectively with The program level list of the white list and the program level list of the blacklist are matched;
Wherein, if the type information of the service determined belongs to the container levels list of the white list and is not belonging to The method name of the container levels list of the blacklist, the service call determined belongs to the program level name of the white list It is single, and be not belonging to the container levels list of the blacklist, then judge that the corresponding service of the call request belongs to described supervised The service of control.
A kind of electronic equipment, comprising:
Memory and processor;Wherein, the memory is same as storage computer instruction;The processor is for executing institute State memory storage computer instruction, specifically execute it is any one of above-mentioned described in full link log generation method.
A kind of storage medium, for storing program, described program is performed, for realizing described in above-mentioned any one The generation method of full link log.
In the generation method of full link log provided by the present application, after receiving call request, the calling is first judged Request whether corresponding service belongs to monitored service;Judging that the corresponding service of the call request belongs to described supervised The service of control generates link log, solves and ask for any one just after the corresponding service of the call request is called When asking and calling service, generation link log leads to the problem of increasing unnecessary link log.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of application for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow chart of the generation method of full link log disclosed in the embodiment of the present application;
Fig. 2 is a kind of flow chart of the embodiment for the step S102 that another embodiment of the application discloses;
Fig. 3 is a kind of flow chart of the embodiment for the step S202 that another embodiment of the application discloses;
Fig. 4 is a kind of flow chart of the embodiment for the step S202 that another embodiment of the application discloses;
Fig. 5 is a kind of flow chart of the embodiment for the step S202 that another embodiment of the application discloses;
Fig. 6 is black and white lists display diagram disclosed in another embodiment of the application;
Fig. 7 is a kind of flow chart of the generation method of full link log disclosed in another embodiment of the application;
Fig. 8 is the structural schematic diagram of the generating means of full link log disclosed in another embodiment of the application;
The structural schematic diagram of electronic equipment disclosed in the another embodiment of the present invention of the position Fig. 9.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on Embodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall in the protection scope of this application.
The application proposes the generation method and device of a kind of full link log, to solve to call for any one request When service, generation link log leads to the problem of increasing unnecessary link log.
As shown in Figure 1, the generation method of full link log disclosed in the embodiment of the present application, comprising steps of
S101, call request is received, wherein the call request is for calling service.
Direction recipient is requested to send call request, to call each service of recipient.As any one node Recipient, after receiving the call request, determine the call request for request service, i.e. corresponding clothes of call request Business.
S102, judge whether the corresponding service of the call request belongs to monitored service.
For the service that needs are monitored, node needs to generate link log.Therefore, calling is received in recipient to ask It asks, after determining the corresponding service of the call request, needs further to judge whether the corresponding service of the call request belongs to and supervised The service of control.
Wherein, as one is embodiment, label is arranged in the preparatory service to be monitored, and the calling that sender sends is asked The label for asking the corresponding service of middle carrying call request, determines the corresponding service of call request in recipient, then can use The mode of tag match services whether belong to monitored service to judge that call request is corresponding.
Optionally, in another embodiment of the application, two names are can be set in the another embodiment of step S102 Single, specially blacklist and white list, the blacklist are used to store the information on services without monitoring, and the white list is for depositing Storage needs the information on services monitored.Also, in the present embodiment, information on services is also possible to the label of service, can also be certainly Other information, as long as service can be uniquely determined out.
Specifically, the present embodiment is disclosed to judge whether the corresponding service of the call request belongs to monitored service, As shown in Figure 2, comprising:
S201, the list for obtaining default building.
In this step, the list of acquisition includes at least one of blacklist and white list.Therefore, white name can only be obtained It is single, blacklist can also be only obtained, blacklist and white list can also be obtained certainly, judges call request by two lists Whether corresponding service belongs to monitored service.
S202, the corresponding service of the call request is matched with the information on services in the list obtained.
The different lists acquired according to step S201 match the corresponding service of call request therewith. Wherein, the matching in this step refers to: by information on services included by the corresponding service of the call request and the list obtained Similarity comparison is carried out, if judging the corresponding service of the call request and some information on services similarity included by list It is higher, then illustrate that the corresponding service of call request matches with the information on services in the list.
Optionally, in another embodiment of the application, the list obtained in step S201 includes blacklist, and the black name Single includes container levels list and program level list;Wherein, the container levels list includes a variety of service type informations, described program Grade list includes the call method of service.
It should be noted that service corresponding call method will include it is a variety of, such as: http service, call method packet It includes: UserController.save and UserController.edit etc..But a kind of a variety of call methods of service, and It does not need whole to be monitored, therefore, in the present embodiment, by setting container levels list and program level list, come respectively to need The call method for the service that the service and needs to be monitored monitor is set.
In addition, said vesse can also be passed through if the service to certain specially call method is only needed to be monitored Grade list and program level list are set.
In the present embodiment, a kind of embodiment of step S202, as shown in Figure 3, comprising:
The method name of S301, the type information for determining the corresponding service of the call request and calling.
Requesting party sends call request, and the type information and calling of the service of request call can be carried in the request Method name, therefore, can directly from call request the type information of reading service and calling method name.Certainly, if it is described Call request does not include the type information of service and the method name of calling, but the call request is used to need to illustrate its clothes called Therefore the access path of business and the service determines its service called according to the call request, then obtain the clothes determined The type information of business.Also, service access path, that is, service call method name, accordingly it is also possible to according to call request come Determine the method name of service call.
S302, the type information of the service determined is matched with the container levels list in the blacklist, And the method name of the service call determined is matched with program level list in the blacklist.
Wherein, if the type information of the service determined is not belonging to the container levels list in the blacklist, and institute It states the type information determined and is not belonging to program level list in the blacklist, then judge the corresponding service of the call request Belong to the monitored service.
In the present embodiment, blacklist be for saving the information on services for not needing to be monitored, therefore, the appearance in blacklist What device grade list saved is the type information for not needing the service being monitored, and what program level list saved is not need to be supervised The call method of the service of control.
Therefore, the type information for the service determined is matched with the container levels list in blacklist, will be determined Service calling method matched with the program level list in blacklist.And above-mentioned two matching process the result is that: institute The type information for stating the service determined is not belonging to container levels list in the blacklist, and the type information determined It is not belonging to program level list in the blacklist, illustrates that the corresponding service of the call request is not belonging to blacklist, then is needed pair It is monitored.
Optionally, in another embodiment of the application, the list obtained in step S201 includes white list, and the white name Single includes container levels list and program level list;Wherein, the container levels list includes a variety of service type informations, described program Grade list includes the call method of service.
In the present embodiment, the another embodiment of step S202, as shown in Figure 4, comprising:
The method name of S401, the type information for determining the corresponding service of the call request and calling.
S402, the type information of the service determined is matched with the container levels list in the white list, And the method name of the service call determined is matched with program level list in the white list.
Wherein, if the type information of the service determined belongs to the container levels list in the white list, and it is described The type information determined belongs to program level list in the white list, then judges that the corresponding service of the call request belongs to The monitored service.
In the present embodiment, it is called what whether the corresponding service of request needed to monitor using the information on services in white list Judgement.Specifically, the type information for the service determined is matched with the container levels list in white list, by what is determined Service calling method is matched with the program level list in white list.
Above-mentioned two matching process the result is that: the type information of the service determined belongs in the white list Container levels list, and the type information determined belongs to program level list in the white list, illustrates that the calling is asked It asks corresponding service to belong to white list, then needs to be monitored it.
Optionally, in another embodiment of the application, the list obtained in step S201 includes blacklist and white list, and The white list includes container levels list and program level list, and the blacklist includes container levels list and program level list;Its In, the container levels list includes a variety of service type informations, and described program grade list includes the call method of service.
In the present embodiment, the another embodiment of step S202, as shown in Figure 5, comprising:
The method name of S501, the type information for determining the corresponding service of the call request and calling.
S502, by the type information of the service determined, respectively with the container levels list of the white list and described The container levels list of blacklist is matched, and by the method name of the service call determined, respectively with the white list Program level list and the program level list of the blacklist matched.
Wherein, if the type information of the service determined belongs to the container levels list of the white list and is not belonging to The method name of the container levels list of the blacklist, the service call determined belongs to the program level name of the white list It is single, and be not belonging to the container levels list of the blacklist, then judge that the corresponding service of the call request belongs to described supervised The service of control.
In the present embodiment, determines whether the corresponding service of call request needs to monitor in order to more sufficient, need to adjust It is matched with the method name of the type information and calling of requesting corresponding service respectively at blacklist and white list.
Such as: it include that HTTP service and JDBC are serviced referring to Fig. 6, in white list, in container levels list, program level list packet Include the MySQL.dumpBinlog method name of tpc service.It include that HTTP service and JDBC take in blacklist, in container levels list Business, program level list include the UserController.save and UserController.edit of http service.
When carrying out service monitoring using black, the white list in this example, need to monitor in addition to UserController.save With the MySQL.dumpBinlog of all http service and tpc service outside UserController.edit, all sides are not monitored JDBC service under religious name.
If the corresponding service of S203, the call request mismatched with the information on services in the blacklist, and/or, institute It states the corresponding service of call request to match with the information on services in the white list, then judges that the call request is corresponding Service belongs to the monitored service.
Wherein, it is to need to monitor that the information on services in blacklist, which is the information on services without monitoring, in white list,.Cause This, in step s 201, when the list got is blacklist, in the corresponding service of call request and the blacklist Information on services mismatches, and judges that the corresponding service of the call request belongs to the monitored service;In step s 201, When the list got is white list, corresponding service of the call request matches with the information on services in the white list, Judge that the corresponding service of the call request belongs to the monitored service;In step s 201, the list packet got When including white and black list, corresponding service of the call request matches with the information on services in the white list, and with Information on services in the blacklist mismatches, and judges that the corresponding service of the call request belongs to the monitored clothes Business.
If judging, the corresponding service of the call request belongs to the monitored service, then follow the steps S103, After the corresponding service of the call request is called, link log is generated.
If in step S102, judging that the corresponding service of the call request belongs to monitored service, then illustrating to need Link log is generated, therefore, after the corresponding service of the call request is called, generates link log.Wherein, link log can Include: the affairs ID of call request, recipient's mark of call request, call request called service identifiers, allocating time, Calling interface etc..
If should be noted in step S102, judge that the corresponding service of the call request is not belonging to be monitored Service, then can exit the process of the present embodiment.
Another embodiment of the application also discloses a kind of generation method of full link log, as shown in fig. 7, comprises step:
S701, call request is received, wherein the call request is for calling service.
S702, judge whether the corresponding service of the call request belongs to monitored service.
If judging, the corresponding service of the call request belongs to the monitored service, then follow the steps S703, After the corresponding service of the call request is called, link log is generated.
S704, the affairs ID in the acquisition call request and service call chain serial number.
The call request received in step S701 may be needed for calling multiple services.Therefore, in a node Receive the call request, and after generating link log, it is also necessary to by call request to next node-node transmission.Specifically, being Make to indicate the call request one link of corresponding link, therefore, it is necessary to obtain affairs ID and clothes in call request Business call chain serial number.
Optionally, in another embodiment of the application, judge to obtain less than the affairs ID in the call request with And in the case where service call chain serial number, then illustrate that the call request is the starting of entire link, therefore, it is necessary to be entire link Unique affairs ID is created, and service call chain serial number initial value is set.
S705, the service call chain serial number is updated.
Wherein, for the ease of the different nodes of resolution link, the initial value of service call chain serial number may be configured as 0.Also, Service call chain serial number is updated, then is to add one on the basis of original service call chain serial number, is used to illustrate to have passed through one A node.
S706, according to the affairs ID and the updated service call chain serial number gencration call request, and to next Service transmission.
Specifically, the call request that this step generates is as call request to be generated, a kind of implementation of generating mode Mode are as follows: establish the association between the affairs ID, the updated service call chain serial number and call request to be generated Relationship, so that can use the call request to be generated after the call request to be generated is sent to next service, The affairs ID and the updated service call chain serial number are obtained in incidence relation.It, can be in another embodiment The ID and the updated service call chain serial number are carried in the call request to be generated, in this way, can be from Obtained in call request to be generated carrying affairs ID and updated service call chain serial number.
After next service receives call request, then it can be carried out according to the black and white lists of node sets where itself Whether the judgement of link log is generated.
It should also be noted that, in the present embodiment, the specific work process of step S701~S703, reference can be made to above-mentioned implementation Example content, details are not described herein again.
Another embodiment of the application also discloses a kind of generating means of full link log, as shown in Figure 8, comprising:
Receiving unit 801, for receiving call request, wherein the call request is for calling service.
Judging unit 802, for judging whether the corresponding service of the call request belongs to monitored service.
Generation unit 803, if judging that the corresponding service of the call request belongs to the quilt for the judging unit The service of monitoring then generates link log after the corresponding service of the call request is called.
The specific work process of each unit in the embodiment of the present application can be found in the embodiment content of corresponding diagram 1, herein It repeats no more.
Optionally, in another embodiment of the application, judging unit 802, comprising:
First acquisition unit, for obtaining the list of default building, wherein the list includes blacklist and white list At least one;Wherein, the blacklist is used to store the information on services without monitoring, and the white list needs to monitor for storing Information on services.
Matching unit, for matching the corresponding service of the call request with the information on services in the list.
If the information on services in the corresponding service of call request and the blacklist mismatches, and/or, the calling It requests corresponding service to match with the information on services in the white list, then judges that the corresponding service of the call request belongs to In the monitored service.
The specific work process of each unit in the embodiment of the present application can be found in the embodiment content of corresponding diagram 2, herein It repeats no more.
Optionally, in another embodiment of the application, the list includes blacklist and white list, and the white list packet Container levels list and program level list are included, the blacklist includes container levels list and program level list;Wherein, the container levels List includes a variety of service type informations, and described program grade list includes the call method of service;The matching unit, comprising:
Determination unit, for determining the type information of the corresponding service of the call request and the method name of calling.
Coupling subelement, for by the type information of the service determined, respectively with the container levels of the white list The container levels list of list and the blacklist is matched, and by the method name of the service call determined, respectively with The program level list of the white list and the program level list of the blacklist are matched.
Wherein, if the type information of the service determined belongs to the container levels list of the white list and is not belonging to The method name of the container levels list of the blacklist, the service call determined belongs to the program level name of the white list It is single, and be not belonging to the container levels list of the blacklist, then judge that the corresponding service of the call request belongs to described supervised The service of control.
Optionally, in another embodiment of the application, the list includes blacklist, and the blacklist includes container levels List and program level list;Wherein, the container levels list includes a variety of service type informations, and described program grade list includes clothes The call method of business;The matching unit is used for:
Determine the type information of the corresponding service of the call request and the method name of calling;
The type information of the service determined is matched with the container levels list in the blacklist, and by institute The method name for stating the service call determined is matched with program level list in the blacklist;
If the type information of the service determined is not belonging to the container levels list in the blacklist, and the determination Type information out is not belonging to program level list in the blacklist, then judges that the corresponding service of the call request belongs to institute State monitored service.
Optionally, in another embodiment of the application, the list includes white list, and the white list includes container levels List and program level list;Wherein, the container levels list includes a variety of service type informations, and described program grade list includes clothes The call method of business;The matching unit is used for:
Determine the type information of the corresponding service of the call request and the method name of calling;
The type information of the service determined is matched with the container levels list in the white list, and by institute The method name for stating the service call determined is matched with program level list in the white list;
Wherein, if the type information of the service determined belongs to the container levels list in the white list, and it is described The type information determined belongs to program level list in the white list, then judges that the corresponding service of the call request belongs to The monitored service.
The specific work process of unit disclosed in the above-mentioned several embodiments of the application, reference can be made in corresponding embodiment of the method Hold, details are not described herein again.
Another embodiment of the application also discloses a kind of electronic equipment, as shown in Figure 9, comprising: memory 901 and processor 902;Wherein, memory 901 is same as storage computer instruction;The computer that processor 902 is used to execute the storage of memory 901 refers to Enable, specifically execute it is any one of above-mentioned described in full link log generation method.
Another embodiment of the application also discloses a kind of storage medium, and for storing program, described program is performed, and uses In the generation method for realizing full link log described in above-mentioned any one.
In the above embodiments of the present application, it can be realized in whole or in part by software, hardware or a combination thereof. When implemented in software, it can realize in the form of a computer program product in whole or in part.The computer program Product includes one or more computer instruction.When loading on computers and executing the computer program instructions, all Or partly generate according to process or function described in the embodiment of the present application, the computer can be by computer, specially With computer, computer network or other editable devices.The computer instruction can store in computer-readable storage In medium, or from a computer readable storage medium to the transmission of another computer readable storage medium, such as: the meter The instruction of calculation machine can pass through wired (such as coaxial cable, multiple twin from a web-site, computer, server or data center Line, optical fiber) or wireless (such as infrared, wireless, microwave etc.) mode to another web-site, computer, server or number It is transmitted according to center.The computer readable storage medium can be any usable medium that computer can access either The data storage devices such as server, the data center integrated including one or more usable medium.The usable medium can be with It is magnetic medium, (such as: floppy disk, hard disk, tape), optical medium (such as: CD) or semiconductor medium (such as solid-state is hard Disk (SSD)) etc..
Professional technician can be realized or use the application.Profession of the various modifications to these embodiments to this field It will be apparent for technical staff, the general principles defined herein can not depart from spirit herein or model In the case where enclosing, realize in other embodiments.Therefore, the application is not intended to be limited to the embodiments shown herein, And it is to fit to the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. a kind of generation method of full link log characterized by comprising
Receive call request, wherein the call request is for calling service;
Judge whether the corresponding service of the call request belongs to monitored service;
If judging, the corresponding service of the call request belongs to the monitored service, corresponding in the call request After service is called, link log is generated.
2. the method according to claim 1, wherein the corresponding service of the judgement call request, if Belong to monitored service, comprising:
Obtain the list of default building, wherein the list includes at least one of blacklist and white list;Wherein, described black List is used to store the information on services without monitoring, and the white list is used to store the information on services for needing to monitor;
The corresponding service of the call request is matched with the information on services in the list;
If the information on services in the corresponding service of call request and the blacklist mismatches, and/or, the call request Corresponding service matches with the information on services in the white list, then judges that the corresponding service of the call request belongs to institute State monitored service.
3. according to the method described in claim 2, it is characterized in that, the list includes blacklist, and the blacklist includes Container levels list and program level list;Wherein, the container levels list includes a variety of service type informations, described program grade list Call method including service;
It is described to match the corresponding service of the call request with the information on services in the list, comprising:
Determine the type information of the corresponding service of the call request and the method name of calling;
The type information of the service determined is matched with the container levels list in the blacklist, and will be described true The method name for the service call made is matched with program level list in the blacklist;
If the type information of the service determined is not belonging to the container levels list in the blacklist, and described determines Type information is not belonging to program level list in the blacklist, then judges that the corresponding service of the call request belongs to the quilt The service of monitoring.
4. according to the method described in claim 2, it is characterized in that, the list includes white list, and the white list includes Container levels list and program level list;Wherein, the container levels list includes a variety of service type informations, described program grade list Call method including service;
It is described to match the corresponding service of the call request with the information on services in the list, comprising:
Determine the type information of the corresponding service of the call request and the method name of calling;
The type information of the service determined is matched with the container levels list in the white list, and will be described true The method name for the service call made is matched with program level list in the white list;
Wherein, if the type information of the service determined belongs to the container levels list in the white list, and the determination Type information out belongs to program level list in the white list, then it is described to judge that the corresponding service of the call request belongs to Monitored service.
5. according to the method described in claim 2, it is characterized in that, the list includes blacklist and white list, and it is described white List includes container levels list and program level list, and the blacklist includes container levels list and program level list;Wherein, described Container levels list includes a variety of service type informations, and described program grade list includes the call method of service;
It is described to match the corresponding service of the call request with the information on services in the list, comprising:
Determine the type information of the corresponding service of the call request and the method name of calling;
By the type information of the service determined, respectively with the appearance of the container levels list of the white list and the blacklist Device grade list is matched, and by the method name of the service call determined, respectively with the program level name of the white list The program level list of the single and described blacklist is matched;
Wherein, if the type information of the service determined belongs to the container levels list of the white list and is not belonging to described The method name of the container levels list of blacklist, the service call determined belongs to the program level list of the white list, and It is not belonging to the container levels list of the blacklist, then judges that the corresponding service of the call request belongs to the monitored clothes Business.
6. the method according to claim 1, wherein after the generation link log, further includes:
Obtain the affairs ID and service call chain serial number in the call request;
Update the service call chain serial number;
According to the affairs ID and the updated service call chain serial number gencration call request, and to next service transmission.
7. according to the method described in claim 6, it is characterized by further comprising:
Judge the affairs ID obtained less than in the call request and service call chain serial number, then creates unique affairs ID And service call chain serial number initial value is set.
8. a kind of generating means of full link log characterized by comprising
Receiving unit, for receiving call request, wherein the call request is for calling service;
Judging unit, for judging whether the corresponding service of the call request belongs to monitored service;
Generation unit, if judging that the corresponding service of the call request belongs to the monitored clothes for the judging unit Business generates link log then after the corresponding service of the call request is called.
9. a kind of electronic equipment characterized by comprising
Memory and processor;Wherein, the memory is same as storage computer instruction;The processor is for executing described deposit The computer instruction of reservoir storage, the specific generation side for executing the full link log as described in any one of claim 1-7 Method.
10. a kind of storage medium, which is characterized in that for storing program, described program is performed, and is wanted for realizing such as right Seek the generation method of full link log described in 1-7 any one.
CN201811442226.1A 2018-11-29 2018-11-29 Method for generating full-link log and related system Active CN109600254B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811442226.1A CN109600254B (en) 2018-11-29 2018-11-29 Method for generating full-link log and related system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811442226.1A CN109600254B (en) 2018-11-29 2018-11-29 Method for generating full-link log and related system

Publications (2)

Publication Number Publication Date
CN109600254A true CN109600254A (en) 2019-04-09
CN109600254B CN109600254B (en) 2022-04-26

Family

ID=65959723

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811442226.1A Active CN109600254B (en) 2018-11-29 2018-11-29 Method for generating full-link log and related system

Country Status (1)

Country Link
CN (1) CN109600254B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111124819A (en) * 2019-12-10 2020-05-08 中国建设银行股份有限公司 Method and device for monitoring full link
CN112363855A (en) * 2020-11-13 2021-02-12 北京基调网络股份有限公司 Call chain data generation method, topology generation method and system and computer equipment
CN114884807A (en) * 2022-05-20 2022-08-09 远景智能国际私人投资有限公司 Link log generation method and device, Internet of things platform and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130110758A1 (en) * 2011-10-28 2013-05-02 Xerox Corporation Methods and systems for scalable extraction of episode rules using incremental episode tree construction in a multi-application event space
CN203039704U (en) * 2012-08-07 2013-07-03 北京鼎震科技有限责任公司 Web log storage system
CN103220277A (en) * 2013-04-01 2013-07-24 新浪技术(中国)有限公司 Method, device and system for monitoring cross site scripting attacks
CN104065657A (en) * 2014-06-26 2014-09-24 北京思特奇信息技术股份有限公司 Method for dynamically controlling user behavior based on IP access and system thereof
CN104346365A (en) * 2013-07-30 2015-02-11 阿里巴巴集团控股有限公司 Device and method for determining specific service associated logs
CN105653943A (en) * 2015-12-24 2016-06-08 北京奇虎科技有限公司 Log auditing method and system for android applications
CN105827522A (en) * 2015-11-10 2016-08-03 广东亿迅科技有限公司 Gateway equipment for processing log files
CN106777371A (en) * 2017-01-23 2017-05-31 北京齐尔布莱特科技有限公司 Result collection system and method
CN108462598A (en) * 2017-02-21 2018-08-28 阿里巴巴集团控股有限公司 A kind of daily record generation method, log analysis method and device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130110758A1 (en) * 2011-10-28 2013-05-02 Xerox Corporation Methods and systems for scalable extraction of episode rules using incremental episode tree construction in a multi-application event space
CN203039704U (en) * 2012-08-07 2013-07-03 北京鼎震科技有限责任公司 Web log storage system
CN103220277A (en) * 2013-04-01 2013-07-24 新浪技术(中国)有限公司 Method, device and system for monitoring cross site scripting attacks
CN104346365A (en) * 2013-07-30 2015-02-11 阿里巴巴集团控股有限公司 Device and method for determining specific service associated logs
CN104065657A (en) * 2014-06-26 2014-09-24 北京思特奇信息技术股份有限公司 Method for dynamically controlling user behavior based on IP access and system thereof
CN105827522A (en) * 2015-11-10 2016-08-03 广东亿迅科技有限公司 Gateway equipment for processing log files
CN105653943A (en) * 2015-12-24 2016-06-08 北京奇虎科技有限公司 Log auditing method and system for android applications
CN106777371A (en) * 2017-01-23 2017-05-31 北京齐尔布莱特科技有限公司 Result collection system and method
CN108462598A (en) * 2017-02-21 2018-08-28 阿里巴巴集团控股有限公司 A kind of daily record generation method, log analysis method and device

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111124819A (en) * 2019-12-10 2020-05-08 中国建设银行股份有限公司 Method and device for monitoring full link
CN111124819B (en) * 2019-12-10 2023-09-22 中国建设银行股份有限公司 Method and device for full link monitoring
CN112363855A (en) * 2020-11-13 2021-02-12 北京基调网络股份有限公司 Call chain data generation method, topology generation method and system and computer equipment
CN112363855B (en) * 2020-11-13 2021-06-18 北京基调网络股份有限公司 Call chain data generation method, topology generation method and system and computer equipment
CN114884807A (en) * 2022-05-20 2022-08-09 远景智能国际私人投资有限公司 Link log generation method and device, Internet of things platform and storage medium

Also Published As

Publication number Publication date
CN109600254B (en) 2022-04-26

Similar Documents

Publication Publication Date Title
CN106888233B (en) Data updating system and method
CN110677462B (en) Access processing method, system, device and storage medium for multi-block chain network
CN109600254A (en) The generation method and related system of full link log
CN109964507B (en) Network function management method, management unit and system
CN109788027A (en) Method of data synchronization, device, server and computer storage medium
CN115004673B (en) Message pushing method, device, electronic equipment and computer readable medium
CN111258627A (en) Interface document generation method and device
CN106095483A (en) The Automation arranging method of service and device
CN109348434B (en) Scene information sending method, sending device and terminal equipment
CN110912990B (en) Method and related equipment for updating consensus period
CN111405052A (en) P2P penetration method based on port prediction, electronic device and medium
CN110049503B (en) Method and equipment for acquiring data
CN114090623A (en) Method and device for creating cache resources, electronic equipment and storage medium
CN116170522B (en) Data transmission method and device, electronic equipment and storage medium
CN112363980A (en) Data processing method and device for distributed system
CN116761144A (en) Method and device for accessing equipment to Internet of things platform
CN111831503B (en) Monitoring method based on monitoring agent and monitoring agent device
CN111309693A (en) Data synchronization method, device and system, electronic equipment and storage medium
CN113553206B (en) Data event execution method and device, electronic equipment and computer readable medium
CN112380411B (en) Sensitive word processing method, device, electronic equipment, system and storage medium
CN114125812A (en) Data synchronization method, device, server and storage medium
CN108228272A (en) WEB containers generation processing method, equipment and server
CN108805741B (en) Fusion method, device and system of power quality data
CN112256714A (en) Data synchronization method and device, electronic equipment and computer readable medium
CN113742617A (en) Cache updating method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant